Preferred Language
Articles
/
yRd0opEBVTCNdQwCcpYb
THE DYNAMIC EVOLUTION OF THE SHELL NEBULAE BY USING INTERACTING WIND MODEL
...Show More Authors

Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Treatment of Sulfate in Sand by Using Magnetic Water Process
...Show More Authors

One of the most important problems in concrete production in Iraq and other country is the high sulfate content in sand that led to damage of concrete and hence reduces its compressive strength and may leads to cracking due to internal sulfate attack and delay ettringite formation. The magnetic water treatment process is adopted in this study. Many samples with different SO3 content are treated with magnetic water (12, 8, 4 and 2)L that needed for each 1kg of sand with the magnetic intensity (9000 and 5000) Gaus. The magnetic water needed is reduced with less SO3 content in sand. The ACI 211.1-91 concrete mix design was used in this research with slump range (75- 100) mm and the specified compressive strength (35MPa). The compressive streng

... Show More
Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
8th Engineering And 2nd International Conference For College Of Engineering – University Of Baghdad: Coec8-2021 Proceedings
Prediction of consolidation due to dewatering by using MATLAB software
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Applied Sciences
Improvement of Mechanical Welding Properties by using Induced Harmonic Vibration
...Show More Authors

View Publication
Scopus (16)
Crossref (15)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Vostok. Afro-aziatskie Obshchestva: Istoriia I Sovremennost
The carrier of word-formation meaning in russian and arabic gramatic traditions: the word model in the russian-arabic translation algorithm
...Show More Authors

The article is devoted to the Russian-Arabic translation, a particular theory of which has not been developed in domestic translation studies to the extent that the mechanisms of translation from and into European languages are described. In this regard, as well as with the growing volumes of Russian-Arabic translation, the issues of this private theory of translation require significant additions and new approaches. The authors set the task of determining the means of translation (cognitive and mental operations and language transformations) that contribute to the achievement of the most equivalent correspondences of such typologically different languages as Russian and Arabic. The work summarizes and analyzes the accumulated exper

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
SOLAR WATER HEATER WITH SHELL AND HELICAL COILED TUBE HEAT EXCHANGER AS A STORAGE TANK
...Show More Authors

In this work an experimental study is performed to evaluate the thermal performance
of locally made closed loop solar hot water system using a shell and helical coiled tube
heat exchanger as a storage tank. Several measurements are taken include inlet and outlet
temperatures of both collectors and supply water and temperature distribution within the
storage tank. This is beside the water flow rate in both collectors and load cycle. The
main parameters of the system are obtained.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
Solving Fuzzy Games Problems by Using Ranking Functions
...Show More Authors

In this paper, we deal with games of fuzzy payoffs problem while there is uncertainty in data. We use the trapezoidal membership function to transform the data into fuzzy numbers and utilize the three different ranking function algorithms. Then we compare between these three ranking algorithms by using trapezoidal fuzzy numbers for the decision maker to get the best gains

View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
Reducing Lost Circulation Problem by Using Rice Material
...Show More Authors

Drilling fluid loss during drilling operation is undesirable, expensive and potentially hazardous problem.

    Nasiriyah oil field is one of the Iraqi oil field that suffer from lost circulation problem. It is known that Dammam, um-Radoma, Tayarat, Shiranish and Hartha are the detecting layers of loss circulation problem. Different type of loss circulation materials (LCMs) ranging from granular, flakes and fibrous were used previously to treat this problem.  

    This study presents the application of rice as a lost circulation material that used to mitigate and stop the loss problem when partial or total losses occurred.

     The experim

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Decoding Reed- Muller Codes by Using Hadamard Matrices
...Show More Authors

This paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.

View Publication Preview PDF
Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Key Exchange Management by using Neural Network Synchronization
...Show More Authors

The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev

... Show More
View Publication Preview PDF